0% found this document useful (0 votes)
112 views76 pages

Cisco - Passit4sure.300 101.v2015!05!19.by - Robert.65q

The document is a sample exam for the Cisco 300-101 exam. It contains 22 multiple choice questions covering topics like network principles, layer 2 technologies, layer 3 technologies, and infrastructure security. The questions provide the question text, possible answers, correct answer, and section for each question to help examinees prepare for the exam.

Uploaded by

Asif Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views76 pages

Cisco - Passit4sure.300 101.v2015!05!19.by - Robert.65q

The document is a sample exam for the Cisco 300-101 exam. It contains 22 multiple choice questions covering topics like network principles, layer 2 technologies, layer 3 technologies, and infrastructure security. The questions provide the question text, possible answers, correct answer, and section for each question to help examinees prepare for the exam.

Uploaded by

Asif Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

Passit4sure.300-101.65Q.

Number: 300-101
Passing Score: 800
Time Limit: 120 min
File Version: 7.6

http://www.gratisexam.com/

i) Hello, today I passed my 300-101 exam with 93% scores,


ii) Valid now a days. My most of friends are passing with Premium VCE files so 100% valid.
iii) When you will read this you will definitely clear exam and get good score.
iv) This vce file will definitely help you.
Sections
1. Network Principles
2. Layer 2 Technologies
3. Layer 3 Technologies
4. VPN Technologies
5. Infrastructure Security
6. Infrastructure Services
Exam A

QUESTION 1
Refer to the exhibit.

A network administrator checks this adjacency table on a router. What is a possible cause for the
incomplete marking?

A. incomplete ARP information


B. incorrect ACL
C. dynamic routing protocol failure
D. serial link congestion

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 2
A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease
simultaneously during periods of congestion. Which condition causes this?

A. global synchronization
B. tail drop
C. random early detection
D. queue management algorithm

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 3
Which three problems result from application mixing of UDP and TCP streams within a network with no
QoS? (Choose three.)

A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput

Correct Answer: ACE


Section: Network Principles
Explanation
Explanation/Reference:

QUESTION 4
Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single
connection during the migration process?

http://www.gratisexam.com/

A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 5
Which statement about the use of tunneling to migrate to IPv6 is true?

A. Tunneling is less secure than dual stack or translation.


B. Tunneling is more difficult to configure than dual stack or translation.
C. Tunneling does not enable users of the new protocol to communicate with users of the old protocol
without dual-stack hosts.
D. Tunneling destinations are manually determined by the IPv4 address in the low-order 32 bits of IPv4-
compatible IPv6 addresses.

Correct Answer: C
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 6
A network administrator executes the command clear ip route. Which two tables does this command clear
and rebuild? (Choose two.)

A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table

Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:

QUESTION 7
Which switching method is used when entries are present in the output of the command show ip cache?

A. fast switching
B. process switching
C. Cisco Express Forwarding switching
D. cut-through packet switching

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 8
Which two actions must you perform to enable and use window scaling on a router? (Choose two.)

A. Execute the command ip tcp window-size 65536.


B. Set window scaling to be used on the remote host.
C. Execute the command ip tcp queuemax.
D. Set TCP options to "enabled" on the remote host.
E. Execute the command ip tcp adjust-mss.

Correct Answer: AB
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 9
Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three.)

A. header compression
B. explicit congestion notification
C. keepalive
D. time stamps
E. TCP path discovery
F. MTU window

Correct Answer: BCD


Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 10
A network administrator uses IP SLA to measure UDP performance and notices that packets on one router
have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this
scenario describe?

A. latency
B. starvation
C. connectionless communication
D. nonsequencing unordered packets
E. jitter

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 11
Under which condition does UDP dominance occur?

A. when TCP traffic is in the same class as UDP


B. when UDP flows are assigned a lower priority queue
C. when WRED is enabled
D. when ACLs are in place to block TCP traffic

Correct Answer: A
Section: Network Principles
Explanation

Explanation/Reference:

QUESTION 12
Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed?

A. Disable CDP on the interface.


B. Execute the vpdn enable command.
C. Execute the no switchport command.
D. Enable QoS FIFO for PPPoE support.

Correct Answer: B
Section: Layer 2 Technologies
Explanation

Explanation/Reference:

QUESTION 13
A network engineer has been asked to ensure that the PPPoE connection is established and authenticated
using an encrypted password. Which technology, in combination with PPPoE, can be used for
authentication in this manner?

A. PAP
B. dot1x
C. IPsec
D. CHAP
E. ESP

Correct Answer: D
Section: Layer 2 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 14
A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no
interesting traffic exists. Which feature can be used to accomplish this task?

A. TCP Adjust
B. Dialer Persistent
C. PPPoE Groups
D. half-bridging
E. Peer Neighbor Route

Correct Answer: B
Section: Layer 2 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 15
Which PPP authentication method sends authentication information in clear text?

A. MS CHAP
B. CDPCP
C. CHAP
D. PAP

Correct Answer: D
Section: Layer 2 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 16
Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific
connection?

A. Frame Relay inverse ARP


B. static DLCI mapping
C. Frame Relay broadcast queue
D. dynamic DLCI mapping

Correct Answer: A
Section: Layer 2 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 17
Which statement is true about the PPP Session Phase of PPPoE?

A. PPP options are negotiated and authentication is not performed. Once the link setup is completed,
PPPoE functions as a Layer 3 encapsulation method that allows data to be transferred over the PPP
link within PPPoE headers.
B. PPP options are not negotiated and authentication is performed. Once the link setup is completed,
PPPoE functions as a Layer 4 encapsulation method that allows data to be transferred over the PPP
link within PPPoE headers.
C. PPP options are automatically enabled and authorization is performed. Once the link setup is
completed, PPPoE functions as a Layer 2 encapsulation method that allows data to be encrypted over
the PPP link within PPPoE headers.
D. PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE
functions as a Layer 2 encapsulation method that allows data to be transferred over the PPP link within
PPPoE headers.

Correct Answer: D
Section: Layer 2 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 18
PPPoE is composed of which two phases?

A. Active Authentication Phase and PPP Session Phase


B. Passive Discovery Phase and PPP Session Phase
C. Active Authorization Phase and PPP Session Phase
D. Active Discovery Phase and PPP Session Phase

Correct Answer: D
Section: Layer 2 Technologies
Explanation

Explanation/Reference:

QUESTION 19
Refer to the exhibit.

Which one statement is true?

A. Traffic from the 172.16.0.0/16 network will be blocked by the ACL.


B. The 10.0.0.0/8 network will not be advertised by Router B because the network statement for the
10.0.0.0/8 network is missing from Router B.
C. The 10.0.0.0/8 network will not be in the routing table on Router B.
D. Users on the 10.0.0.0/8 network can successfully ping users on the 192.168.5.0/24 network, but users
on the 192.168.5.0/24 cannot successfully ping users on the 10.0.0.0/8 network.
E. Router B will not advertise the 10.0.0.0/8 network because it is blocked by the ACL.

Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:

QUESTION 20
A router with an interface that is configured with ipv6 address autoconfig also has a link-local address
assigned. Which message is required to obtain a global unicast address when a router is present?

A. DHCPv6 request
B. router-advertisement
C. neighbor-solicitation
D. redirect

Correct Answer: B
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 21
An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the
router. The router has the following interface parameters:

mac address C601.420F.0007


subnet 2001:DB8:0:1::/64

Which IPv6 addresses should the engineer add to the documentation?

A. 2001:DB8:0:1:C601:42FF:FE0F:7
B. 2001:DB8:0:1:FFFF:C601:420F:7
C. 2001:DB8:0:1:FE80:C601:420F:7
D. 2001:DB8:0:1:C601:42FE:800F:7

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 22
For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router.
However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused
this issue?

A. The traffic filter is blocking all ICMPv6 traffic.


B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly.
C. The link-local addresses that were used by OSPFv3 were explicitly denied, which caused the neighbor
relationships to fail.
D. IPv6 traffic filtering can be implemented only on SVIs.

Correct Answer: C
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 23
What is the purpose of the autonomous-system {autonomous-system-number} command?
A. It sets the EIGRP autonomous system number in a VRF.
B. It sets the BGP autonomous system number in a VRF.
C. It sets the global EIGRP autonomous system number.
D. It sets the global BGP autonomous system number.

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 24
What is the default OSPF hello interval on a Frame Relay point-to-point network?

A. 10
B. 20
C. 30
D. 40

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 25
Refer to the exhibit.

Which command only announces the 1.2.3.0/24 network out of FastEthernet 0/0?

A. distribute list 1 out


B. distribute list 1 out FastEthernet0/0
C. distribute list 2 out
D. distribute list 2 out FastEthernet0/0

Correct Answer: D
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 26
Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?

A. 10.9.1.0/24
B. 10.8.0.0/24
C. 10.8.0.0/16
D. 10.8.0.0/23

Correct Answer: B
Section: Layer 3 Technologies
Explanation

Explanation/Reference:
Explanation:

QUESTION 27
Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFv3.
The networks that are advertised from Router A do not show up in Router B's routing table. After debugging
IPv6 packets, the message "not a router" is found in the output. Why is the routing information not being
learned by Router B?

A. OSPFv3 timers were adjusted for fast convergence.


B. The networks were not advertised properly under the OSPFv3 process.
C. An IPv6 traffic filter is blocking the networks from being learned via the Router B interface that is
connected to Router A.
D. IPv6 unicast routing is not enabled on Router A or Router B.

Correct Answer: D
Section: Layer 3 Technologies
Explanation

Explanation/Reference:
Explanation:

http://www.gratisexam.com/

QUESTION 28
After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses
have the 16-bit hexadecimal value of "FFFE" inserted into the address. Based on this information, what do
you conclude about these IPv6 addresses?

A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 29
A packet capture log indicates that several router solicitation messages were sent from a local host on the
IPv6 segment. What is the expected acknowledgment and its usage?

A. Router acknowledgment messages will be forwarded upstream, where the DHCP server will allocate
addresses to the local host.
B. Routers on the IPv6 segment will respond with an advertisement that provides an external path from the
local subnet, as well as certain data, such as prefix discovery.
C. Duplicate Address Detection will determine if any other local host is using the same IPv6 address for
communication with the IPv6 routers on the segment.
D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature, which is statically
defined by the network administrator.

Correct Answer: B
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 30
You have been asked to evaluate how EIGRP is functioning in a customer network.
What type of route filtering is occurring on R6

A. Distribute-list using an ACL


B. Distribute-list using a prefix-list
C. Distribute-list using a route-map
D. An ACL using a distance of 255

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 31
You have been asked to evaluate how EIGRP is functioning in a customer network.
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

A. CISCO
B. EIGRP
C. key
D. MD5

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

R4 and R2 configs are as shown below:


Clearly we see the actual key chain is named CISCO.

QUESTION 32
You have been asked to evaluate how EIGRP is functioning in a customer network.
What is the advertised distance for the 192.168.46.0 network on R1?

A. 333056
B. 1938688
C. 1810944
D. 307456

Correct Answer: C
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 33
You have been asked to evaluate how EIGRP is functioning in a customer network.
What percent of R1's interfaces bandwidth is EIGRP allowed to use?

A. 10
B. 20
C. 30
D. 40

Correct Answer: B
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 34
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output you have
examined?

A. 1858
B. 1601
C. 600
D. 1569

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 35
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
Which of the following statements is true about the serial links that terminate in R3

A. The R1-R3 link needs the neighbor command for the adjacency to stay up
B. The R2-R3 link OSPF timer values are 30, 120, 120
C. The R1-R3 link OSPF timer values should be 10,40,40
D. R3 is responsible for flooding LSUs to all the routers on the network.

Correct Answer: B
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 36
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
How many times was SPF algorithm executed on R4 for Area 1?

A. 1
B. 5
C. 9
D. 20
E. 54
F. 224

Correct Answer: C
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

QUESTION 37
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is
true?

A. R5's Loopback and R6's Loopback are both present in R5's Routing table
B. R5's Loopback and R6's Loopback are both present in R6's Routing table
C. Only R5's loopback is present in R5's Routing table
D. Only R6's loopback is present in R5's Routing table
E. Only R5's loopback is present in R6's Routing table

Correct Answer: A
Section: Layer 3 Technologies
Explanation

Explanation/Reference:

4, VPN Technologies

QUESTION 38
A company has just opened two remote branch offices that need to be connected to the corporate network.
Which interface configuration output can be applied to the corporate router to allow communication to the
remote sites?

A. interface Tunnel0bandwidth 1536ip address 209.165.200.230 255.255.255.224tunnel source


Serial0/0tunnel mode gre multipoint
B. interface fa0/0bandwidth 1536ip address 209.165.200.230 255.255.255.224tunnel mode gre multipoint
C. interface Tunnel0bandwidth 1536ip address 209.165.200.231 255.255.255.224tunnel source
209.165.201.1tunnel-mode dynamic
D. interface fa 0/0bandwidth 1536ip address 209.165.200.231 255.255.255.224tunnel source
192.168.161.2tunnel destination 209.165.201.1tunnel-mode dynamic

Correct Answer: A
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 39
A network engineer executes the show crypto ipsec sa command. Which three pieces of information are
displayed in the output? (Choose three.)

A. inbound crypto map


B. remaining key lifetime
C. path MTU
D. tagged packets
E. untagged packets
F. invalid identity packets

Correct Answer: ABC


Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 40
Refer to the following output:

Router#show ip nhrp detail


10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47 TypE. dynamic, Flags: authoritative
unique nat registered used NBMA address: 10.12.1.2
What does the authoritative flag mean in regards to the NHRP information?

A. It was obtained directly from the next-hop server.


B. Data packets are process switches for this mapping entry.
C. NHRP mapping is for networks that are local to this router.
D. The mapping entry was created in response to an NHRP registration request.
E. The NHRP mapping entry cannot be overwritten.

Correct Answer: A
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 41
Which common issue causes intermittent DMVPN tunnel flaps?

A. a routing neighbor reachability issue


B. a suboptimal routing table
C. interface bandwidth congestion
D. that the GRE tunnel to hub router is not encrypted

Correct Answer: A
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 42
Which encapsulation supports an interface that is configured for an EVN trunk?

A. 802.1Q
B. ISL
C. PPP
D. Frame Relay
E. MPLS
F. HDLC

Correct Answer: A
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 43
Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)

A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration

Correct Answer: ABC


Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 44
A user is having issues accessing file shares on a network. The network engineer advises the user to open
a web browser, input a prescribed IP address, and follow the instructions. After doing this, the user is able
to access company shares. Which type of remote access did the engineer enable?

A. EZVPN
B. IPsec VPN client access
C. VPDN client access
D. SSL VPN client access

Correct Answer: D
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 45
Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco
Express Forwarding?
A. FlexVPN
B. DMVPN
C. GETVPN
D. Cisco Easy VPN

Correct Answer: B
Section: VPN Technologies
Explanation

Explanation/Reference:

QUESTION 46
Which traffic does the following configuration allow?

ipv6 access-list cisco


permit ipv6 host 2001:DB8:0:4::32 any eq ssh
line vty 0 4
ipv6 access-class cisco in

A. all traffic to vty 0 4 from source 2001:DB8:0:4::32


B. only ssh traffic to vty 0 4 from source all
C. only ssh traffic to vty 0 4 from source 2001:DB8:0:4::32
D. all traffic to vty 0 4 from source all

Correct Answer: C
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 47
For troubleshooting purposes, which method can you use in combination with the "debug ip packet"
command to limit the amount of output data?

A. You can disable the IP route cache globally.


B. You can use the KRON scheduler.
C. You can use an extended access list.
D. You can use an IOS parser.
E. You can use the RITE traffic exporter.

Correct Answer: C
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 48
Refer to the following access list.

access-list 100 permit ip any any log


After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization
has risen to 99 percent. What is the reason for this?

A. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched.
B. A packet that matches access-list with the "log" keyword is fast switched.
C. A packet that matches access-list with the "log" keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.

Correct Answer: C
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 49
Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the
routing table?

A. source address
B. destination address
C. router interface
D. default gateway

Correct Answer: A
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 50
What are the three modes of Unicast Reverse Path Forwarding?

A. strict mode, loose mode, and VRF mode


B. strict mode, loose mode, and broadcast mode
C. strict mode, broadcast mode, and VRF mode
D. broadcast mode, loose mode, and VRF mode

Correct Answer: A
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 51
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the
perimeter router, accomplish?

router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log router (config)#access-list 101 deny
ip 192.168.0.0 0.0.255.255 any log router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
router (config)#access-list 101 permit ip any any
router (config)#interface fastEthernet 1/0
router (config-if)#ip access-group 101 in

A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255,


192.168.0.0-192.168.255.255 and logs any intrusion attempts.
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to
the Internet.
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion
attempts.
D. It prevents private internal addresses to be accessed directly from outside.

Correct Answer: C
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 52
Refer to the following command:

router(config)# ip http secure-port 4433

Which statement is true?

A. The router will listen on port 4433 for HTTPS traffic.


B. The router will listen on port 4433 for HTTP traffic.
C. The router will never accept any HTTP and HTTPS traffic.
D. The router will listen to HTTP and HTTP traffic on port 4433.

Correct Answer: A
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 53
A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to
172.20.14.225. Which command should be applied to the configuration to allow this?

A. router(config-if)#ip helper-address 172.20.14.225


B. router(config-if)#udp helper-address 172.20.14.225
C. router(config-if)#ip udp helper-address 172.20.14.225
D. router(config-if)#ip helper-address 172.20.14.225 69 53 49

Correct Answer: A
Section: Infrastructure Security
Explanation

Explanation/Reference:

QUESTION 54
A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications.
However, the engineer is not concerned with authentication or encryption. Which command satisfies the
requirements of this scenario?

A. router(config)#snmp-server host 172.16.201.28 traps version 2c CISCORO


B. router(config)#snmp-server host 172.16.201.28 informs version 2c CISCORO
C. router(config)#snmp-server host 172.16.201.28 traps version 3 auth CISCORO
D. router(config)#snmp-server host 172.16.201.28 informs version 3 auth CISCORO

Correct Answer: A
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 55
When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?
A. username
B. password
C. community-string
D. encryption-key

Correct Answer: A
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 56
After a recent DoS attack on a network, senior management asks you to implement better logging
functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging
results? (Choose two.)

A. Use the msec option to enable service time stamps.


B. Increase the logging history.
C. Set the logging severity level to 1.
D. Specify a logging rate limit.
E. Disable event logging on all noncritical items.

Correct Answer: AB
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 57
A network engineer finds that a core router has crashed without warning. In this situation, which feature can
the engineer use to create a crash collection?

A. secure copy protocol


B. core dumps
C. warm reloads
D. SNMP
E. NetFlow

Correct Answer: B
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 58
A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp
broadcast client command. Assuming that an NTP server is already set up, what is the result of the
command?

A. It enables receiving NTP broadcasts on the interface where the command was executed.
B. It enables receiving NTP broadcasts on all interfaces globally.
C. It enables a device to be an NTP peer to another device.
D. It enables a device to receive NTP broadcast and unicast packets.

Correct Answer: A
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 59
IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows
IPv6 devices to communicate with IPv4 servers?

A. NAT
B. NATng
C. NAT64
D. dual-stack NAT
E. DNS64

Correct Answer: C
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 60
A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for
performance gauging. Which type of statistics does the engineer see?

A. connectionless-oriented
B. service-oriented
C. connection-oriented
D. application-oriented

Correct Answer: C
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 61
A network engineer executes the "ipv6 flowset" command. What is the result?

A. Flow-label marking in 1280-byte or larger packets is enabled.


B. Flow-set marking in 1280-byte or larger packets is enabled.
C. IPv6 PMTU is enabled on the router.
D. IPv6 flow control is enabled on the router.

Correct Answer: A
Section: Infrastructure Services
Explanation

Explanation/Reference:

http://www.gratisexam.com/
QUESTION 62
A network engineer is asked to configure a "site-to-site" IPsec VPN tunnel. One of the last things that the
engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside
source list 1 int s0/0 overload. Which functions do the two commands serve in this scenario?

A. The command access-list 1 defines interesting traffic that is allowed through the tunnel.
B. The command ip nat inside source list 1 int s0/0 overload disables "many-to-one" access for all devices
on a defined segment to share a single IP address upon exiting the external interface.
C. The command access-list 1 permit any defines only one machine that is allowed through the tunnel.
D. The command ip nat inside source list 1 int s0/0 overload provides "many-to-one" access for all devices
on a defined segment to share a single IP address upon exiting the external interface.

Correct Answer: D
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 63
A network engineer is notified that several employees are experiencing network performance related
issues, and bandwidth-intensive applications are identified as the root cause. In order to identify which
specific type of traffic is causing this slowness, information such as the source/destination IP and Layer 4
port numbers is required. Which feature should the engineer use to gather the required information?

A. SNMP
B. Cisco IOS EEM
C. NetFlow
D. Syslog
E. WCCP

Correct Answer: C
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 64
A company's corporate policy has been updated to require that stateless, 1-to-1, and IPv6 to IPv6
translations at the Internet edge are performed. What is the best solution to ensure compliance with this
new policy?

A. NAT64
B. NAT44
C. NATv6
D. NPTv4
E. NPTv6

Correct Answer: E
Section: Infrastructure Services
Explanation

Explanation/Reference:

QUESTION 65
Which two methods of deployment can you use when implementing NAT64? (Choose two.)

A. stateless
B. stateful
C. manual
D. automatic
E. static
F. functional
G. dynamic

Correct Answer: AB
Section: Infrastructure Services
Explanation

Explanation/Reference:

http://www.gratisexam.com/

You might also like